Behavioral task
behavioral1
Sample
078d1420b0438679088665bf105cc967_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
078d1420b0438679088665bf105cc967_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
078d1420b0438679088665bf105cc967_JaffaCakes118
-
Size
39KB
-
MD5
078d1420b0438679088665bf105cc967
-
SHA1
4878af6f7b16ee6c073fa6369b2721141ff0f54e
-
SHA256
2f8cd52a8df132a34c0cbe212f1b54067ab1ef07c1fefe04edc9d22c92f6bc8a
-
SHA512
1eff48efc2b2d4cfdb41f9bac463f61c3812813cd85255d8427171192b7978bd8011aef0e772f63f6021d5e3f41f67e344630a976f3deead45920799414a8b3c
-
SSDEEP
768:3sSeJCa3uBwCG0mJqrPrZDBj4JVves3e:ZkC3tB4ve1
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 078d1420b0438679088665bf105cc967_JaffaCakes118
Files
-
078d1420b0438679088665bf105cc967_JaffaCakes118.exe windows:4 windows x86 arch:x86
badea99f1641b1daf312fc78db031b66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriority
CreateThread
GetWindowsDirectoryA
GetSystemDirectoryA
GetShortPathNameA
GetModuleFileNameA
CloseHandle
Sleep
CreateEventA
OpenEventA
CreateRemoteThread
GlobalFree
GlobalUnlock
GetProcAddress
WaitForSingleObject
GlobalLock
GlobalAlloc
GetCurrentProcess
OpenProcess
VirtualProtectEx
WriteProcessMemory
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTickCount
VirtualAllocEx
VirtualFreeEx
CopyFileA
GetModuleHandleA
FindResourceA
SizeofResource
LoadResource
LockResource
DeleteFileA
CreateFileA
WriteFile
FreeResource
ExitProcess
LoadLibraryA
ReadProcessMemory
FreeLibrary
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
rand
srand
_stricmp
memset
strcat
strcpy
strlen
memcpy
user32
FindWindowA
GetDesktopWindow
GetWindow
GetWindowTextA
PostMessageA
GetWindowThreadProcessId
winmm
mixerGetLineInfoA
mixerOpen
mixerSetControlDetails
mixerGetLineControlsA
mixerGetControlDetailsA
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE